CN110502380B - Self-checking method of Hash algorithm coprocessor - Google Patents

Self-checking method of Hash algorithm coprocessor Download PDF

Info

Publication number
CN110502380B
CN110502380B CN201910761889.8A CN201910761889A CN110502380B CN 110502380 B CN110502380 B CN 110502380B CN 201910761889 A CN201910761889 A CN 201910761889A CN 110502380 B CN110502380 B CN 110502380B
Authority
CN
China
Prior art keywords
self
checking
data
chip microcomputer
single chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910761889.8A
Other languages
Chinese (zh)
Other versions
CN110502380A (en
Inventor
李立
焦英华
李凌浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhaoxun Hengda Technology Co ltd
Original Assignee
Zhaoxun Hengda Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhaoxun Hengda Technology Co ltd filed Critical Zhaoxun Hengda Technology Co ltd
Priority to CN201910761889.8A priority Critical patent/CN110502380B/en
Publication of CN110502380A publication Critical patent/CN110502380A/en
Application granted granted Critical
Publication of CN110502380B publication Critical patent/CN110502380B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2205Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing using arrangements specific to the hardware being tested
    • G06F11/2236Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing using arrangements specific to the hardware being tested to test CPU or processors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/26Functional testing
    • G06F11/263Generation of test inputs, e.g. test vectors, patterns or sequences ; with adaptation of the tested hardware for testability with external testers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/76Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]

Abstract

The embodiment of the invention relates to a self-checking method of a Hash algorithm coprocessor, which is characterized by comprising the following steps: acquiring small block verification data from a system area to generate first data, acquiring a small block data verification code to generate a first verification code, acquiring large block verification data to generate second data, and acquiring a large block data verification code to generate a second verification code; carrying out first self-checking parameter verification processing on the first data; carrying out second self-checking parameter verification processing on the first verification code; carrying out third self-checking parameter verification processing on the second data; performing fourth self-checking parameter verification processing on the second verification code; performing small block data hash calculation on the first data to generate a first temporary check code, and performing large block data hash calculation on the second data to generate a second temporary check code; performing first function self-checking treatment; performing second function self-checking treatment; and setting the value of a self-checking error counter of the coprocessor in the system area to be 0, and sending the information of successful self-checking to the upper computer.

Description

Self-checking method for Hash algorithm coprocessor
Technical Field
The invention relates to the technical field of single-chip microcomputers, in particular to a self-checking method of a hash algorithm coprocessor.
Background
The Hash algorithm coprocessor is widely used on a safety calculation singlechip and is mainly used for improving the integrity of big data. If the hash algorithm coprocessor has a function error, the verification data generated by the hash algorithm coprocessor is erroneous, and further the upper-layer application of the single chip microcomputer is erroneous in execution. When a common single chip microcomputer applies the hash algorithm coprocessor, functional problems of the on-chip hash algorithm coprocessor can be found only by comparing the upper application before and after calculation.
Disclosure of Invention
The invention aims to provide a self-checking method of a hash algorithm coprocessor, aiming at the defects of the prior art, which is used for checking small data and large data of the hash coprocessor, checking a code complementing machine inside the hash coprocessor while checking the calculation function of the hash check code, and providing a solution entry for self-checking failure by setting a self-checking error counter of the coprocessor.
The invention provides a self-checking method of a hash algorithm coprocessor, which comprises the following steps:
the single chip microcomputer obtains small block verification data from a system area to generate first data, obtains small block data verification codes to generate first verification codes, obtains large block verification data to generate second data, and obtains large block data verification codes to generate second verification codes;
the single chip microcomputer carries out first self-checking parameter checking processing on the first data;
when the first self-checking parameter is verified successfully, the single chip microcomputer conducts second self-checking parameter verification processing on the first verification code;
after the second self-checking parameter is checked successfully, the single chip microcomputer carries out third self-checking parameter checking processing on the second data;
after the third self-checking parameter is checked successfully, the single chip microcomputer carries out fourth self-checking parameter checking processing on the second verification code;
after the fourth self-checking parameter is checked successfully, the singlechip uses the coprocessor to perform small block data hash calculation on the first data according to the first data and the second data to generate a first temporary check code, and uses the coprocessor to perform large block data hash calculation on the second data to generate a second temporary check code;
the single chip microcomputer carries out first function self-checking processing according to the first temporary checking code and the first checking code;
after the first function self-checking is successful, the single chip microcomputer carries out second function self-checking processing according to the second temporary check code and the second check code;
and after the second function self-checking is successful, the single chip microcomputer sets the value of a self-checking error counter of the coprocessor of the system area to be 0 and sends the information of successful self-checking to the upper computer.
Further, the single chip microcomputer obtains the small block verification data from the system area to generate the first data, and before, the method further includes:
and the single chip microcomputer sets the small block verification data, the small block data verification code, the large block verification data and the large block data verification code in a system area.
Further, the single chip microcomputer performs first self-checking parameter checking processing on the first data, and specifically includes:
the single chip microcomputer carries out all-zero parameter verification processing on the value of the first data, and specifically comprises the following steps: when the value of the first data is full hexadecimal 0, the first self-checking parameter fails to check; when the value of the first data is not 0 in full hexadecimal, the first self-checking parameter is checked successfully.
Further, the single chip microcomputer performs second self-checking parameter checking processing on the first checking code, and specifically includes:
the single chip microcomputer carries out all-zero parameter verification processing on the value of the first verification code, and specifically comprises the following steps: when the value of the first check code is 0 in full hexadecimal, the second self-checking parameter fails to check; and when the value of the first check code is not 0 in the full hexadecimal system, the second self-checking parameter is checked successfully.
Further, the third self-checking parameter verification processing is performed on the second data by the single chip, and the third self-checking parameter verification processing specifically includes:
the single chip microcomputer carries out all-zero parameter verification processing on the value of the second data, and specifically: when the value of the second data is full hexadecimal 0, the third self-checking parameter fails to check; and when the value of the second data is not 0 in full hexadecimal, the third self-checking parameter is checked successfully.
Further, the performing, by the single chip microcomputer, a fourth self-checking parameter checking process on the second check code specifically includes:
the single chip microcomputer carries out all-zero parameter check processing on the value of the second check code, and specifically: when the value of the second check code is full hexadecimal 0, the fourth self-checking parameter fails to check; and when the value of the second check code is not the 0 in the full hexadecimal system, the fourth self-checking parameter is checked successfully.
Further, the single chip microcomputer performs first function self-checking processing according to the first temporary check code and the first check code, and specifically includes:
the single chip microcomputer judges whether the values of the first temporary check code and the first check code are equal, and if the values of the first temporary check code and the first check code are equal, the first function self-check is successful; and if the values of the first temporary check code and the first check code are not equal, the first functional self-checking fails.
Further, the single chip microcomputer performs second function self-checking processing according to the second temporary check code and the second check code, and specifically includes:
the single chip microcomputer judges whether the values of the second temporary check code and the second check code are equal, and if the values of the second temporary check code and the second check code are equal, the second function self-check is successful; and if the values of the second temporary check code and the second check code are not equal, the second functional self-checking fails.
Further, the method further comprises:
when the first self-checking parameter fails to check, the single chip microcomputer sets the value of a self-checking error counter of the coprocessor of the system area to be added by 1, the single chip microcomputer exits the self-checking processing flow of the coprocessor and returns error information: verifying that the parameters are wrong;
when the second self-checking parameter fails to check, the single chip microcomputer sets the value of a self-checking error counter of the coprocessor of the system area to be added by 1, the single chip microcomputer exits the self-checking processing flow of the coprocessor and returns error information: verifying that the parameters are wrong;
when the third self-checking parameter fails to check, the single chip microcomputer sets the value of a self-checking error counter of the coprocessor of the system area to be increased by 1, the single chip microcomputer exits the self-checking processing flow of the coprocessor and returns error information: verifying that the parameters are wrong;
when the first function self-checking check fails, the single chip microcomputer sets the value of a coprocessor self-checking error counter of the system area to be added by 1, the single chip microcomputer exits the coprocessor self-checking processing flow and returns error information: the small data hash function of the coprocessor is wrong;
when the second function self-checking check fails, the single chip microcomputer sets the value of a coprocessor self-checking error counter of the system area to be added by 1, the single chip microcomputer exits the coprocessor self-checking processing flow and returns error information: the coprocessor has a big data hash function error.
Further, the method further comprises:
and when the value of the self-checking error counter of the coprocessor exceeds a limit value, the single chip microcomputer stops the use function of the coprocessor.
The invention provides a self-checking method of a Hash algorithm coprocessor, firstly, a single chip computer presets small verification data, small verification codes, large verification data and large verification codes for checking in a system area; after the single chip microcomputer starts the self-check of the hash coprocessor, the first step is to acquire the four preset information and generate corresponding first data, a first verification code, second data and a second verification code; the singlechip firstly carries out four parameter verification on four parameters for verification stored in a system area so as to prevent the parameters from not meeting the Hash calculation requirement; after the first self-checking parameter, the second self-checking parameter, the third self-checking parameter and the fourth self-checking parameter are successfully checked, the single chip starts first function self-checking on the encryption function of the hash coprocessor; after the first function self-checking is successful, the singlechip starts second function self-checking on the decryption function of the hash coprocessor; after the second functional self-check is successful, the hash coprocessing self-check is successfully completed, and the coprocessor is in a normal state, so that the value of the self-check error counter of the coprocessor is reset to 0 by the singlechip, and information of successful self-check is returned to the upper computer.
Drawings
Fig. 1 is a schematic diagram of a self-checking method of a hash algorithm coprocessor according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a self-checking method of a hash algorithm coprocessor according to a second embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In a first embodiment of the present invention, as shown in fig. 1, a schematic diagram of a method for self-checking by a hash algorithm coprocessor is provided, where the method includes the following steps:
and step 11, the single chip microcomputer obtains small block verification data from the system area to generate first data, obtains small block data verification codes to generate first verification codes, obtains large block verification data to generate second data, and obtains large block data verification codes to generate second verification codes.
And step 12, the single chip microcomputer carries out first self-checking parameter checking processing on the first data, and when the value of the first data is not 0 in a full hexadecimal system, the first self-checking parameter checking is successful.
And step 13, after the first self-checking parameter is successfully checked, the single chip microcomputer carries out second self-checking parameter checking processing on the first verification code, and when the value of the first verification code is not 0 in a full hexadecimal manner, the second self-checking parameter is successfully checked.
And step 14, after the second self-checking parameter is checked successfully, the single chip microcomputer performs third self-checking parameter checking processing on the second data, and when the value of the second data is not 0 in a full hexadecimal system, the third self-checking parameter is checked successfully.
And step 15, after the third self-checking parameter is checked successfully, the singlechip carries out fourth self-checking parameter checking processing on the second verification code, and when the value of the second verification code is not 0 in a full hexadecimal system, the fourth self-checking parameter is checked successfully.
And step 16, after the fourth self-checking parameter is successfully checked, the singlechip performs small data hash calculation on the first data by using the coprocessor to generate a first temporary check code according to the first data, and performs large data hash calculation on the second data to generate a second temporary check code.
And step 17, the single chip microcomputer carries out first function self-checking processing according to the first temporary check code and the first check code, and if the values of the first temporary check code and the first check code are equal, the first function self-checking is successful.
Step 18, after the first function self-checking is successful, the single chip microcomputer performs second function self-checking processing according to the second temporary check code and the second check code: and if the values of the second temporary check code and the second check code are equal, the second function self-checking is successful.
And step 19, when the second function self-checking is successful, the single chip microcomputer sets the value of a self-checking error counter of the coprocessor in the system area to be 0, and sends self-checking success information to the upper computer.
In a second embodiment of the present invention, as shown in fig. 2, a schematic diagram of a method for self-checking of a hash algorithm coprocessor is provided, where the method includes the following steps:
and step 31, the single chip microcomputer obtains small block verification data from the system area to generate first data, obtains small block data verification codes to generate first verification codes, obtains large block verification data to generate second data, and obtains large block data verification codes to generate second verification codes.
Step 32, the single chip microcomputer performs first self-checking parameter checking processing on the first data: when the value of the first data is not the full hexadecimal 0, the first self-checking parameter is successfully checked, and the step 33 is carried out; when the value of the first data is all hexadecimal 0, the first self-checking parameter fails to check, and go to step 410.
Step 33, the single chip microcomputer performs second self-checking parameter checking processing on the first verification code: when the value of the first verification code is not the full hexadecimal 0, the second self-checking parameter is successfully checked, and the step 34 is carried out; when the first verification code has a value of 0 in hexadecimal, the second self-checking parameter fails to check, and the process goes to step 410.
Step 34, the single chip microcomputer performs third self-checking parameter checking processing on the second data: when the value of the second data is not the full hexadecimal 0, the third self-checking parameter is successfully checked, and the step 35 is carried out; when the value of the second data is all hexadecimal 0, the third self-checking parameter fails to check, and go to step 410.
Step 35, the single chip microcomputer performs fourth self-checking parameter checking processing on the second verification code: when the value of the second verification code is not the full hexadecimal 0, the fourth self-checking parameter is successfully checked, and the step 36 is carried out; when the value of the second verification code is fully hexadecimal 0, the fourth self-checking parameter fails to check, and the process goes to step 410.
And step 36, the single chip microcomputer performs small block data hash calculation on the first data by using the coprocessor to generate a first temporary check code according to the first data, and performs large block data hash calculation on the second data to generate a second temporary check code.
Step 37, the single chip microcomputer performs first function self-checking processing according to the first temporary check code and the first check code, if the values of the first temporary check code and the first check code are equal, the first function self-checking is successful, and the step 38 is carried out; if the first temporary check code is not equal to the first check code, the first functional self-test check fails, and go to step 420.
Step 38, after the first function self-checking is successful, the single chip microcomputer performs second function self-checking processing according to the second temporary check code and the second check code: if the second temporary check code is equal to the second check code, the second functional self-check is successful, and the process goes to step 39; if the second temporary check code and the second check code have different values, the second functional self-test check fails, and the process goes to step 430.
And step 39, after the second function self-checking is successful, the single chip microcomputer sets the value of a self-checking error counter of the coprocessor in the system area to be 0, and sends self-checking success information to the upper computer.
Step 410, the single chip sets the value of the self-checking error counter of the coprocessor in the system area to add 1, the single chip exits the self-checking processing flow of the coprocessor and returns error information: the verification parameter is incorrect.
Here, the cause of the error is generally the verification parameters pre-stored in the system area for performing the self-check of the hash algorithm coprocessor: problems occur in small block verification data, small block data verification codes, large block experiment data and large block data verification codes.
Step 420, the single chip sets the value of the self-checking error counter of the coprocessor in the system area to add 1, the single chip exits the self-checking processing flow of the coprocessor and returns error information: coprocessor patch data hash function error.
Here, the cause of the error is that the small block data hash function of the hash algorithm coprocessor is not verified at the time of self-test.
Step 430, the single chip sets the value of the coprocessor self-checking error counter in the system area to add 1, the single chip exits the coprocessor self-checking processing flow and returns error information: the coprocessor has a big data hash function error.
Here, the cause of the error is that the hash function of the chunk data of the hash algorithm coprocessor is not verified at the time of self-test.
The invention provides a self-checking method of a Hash algorithm coprocessor, firstly, a single chip computer presets small verification data, small verification codes, large verification data and large verification codes for checking in a system area; when the single chip microcomputer starts the self-check of the hash coprocessor, the first step is to acquire the four preset information and generate corresponding first data, a first verification code, second data and a second verification code; the singlechip firstly carries out four parameter verification on four parameters for verification stored in a system area so as to prevent the parameters from not meeting the Hash calculation requirement; after the first self-checking parameter, the second self-checking parameter, the third self-checking parameter and the fourth self-checking parameter are successfully checked, the single chip starts the first function self-checking on the encryption function of the hash coprocessor; after the first function self-checking is successful, the singlechip starts second function self-checking on the decryption function of the hash coprocessor; after the second function self-check is successful, the Hash co-processing self-check is successfully completed, and the state of the coprocessor is normal, so that the value of the self-check error counter of the coprocessor is reset to 0 by the single chip microcomputer, and information of the success of the self-check is returned to the upper computer. By using the method, the upper computer can randomly select the self-checking time to send the self-checking requirement to the coprocessor; the method of the invention also identifies the self-checking failure by setting the self-checking error counter of the coprocessor, thereby not only ensuring the stable working state of the hash coprocessor, but also providing a timely and convenient early warning processing means for users.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the components and steps of the various examples have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, a software module executed by a processor, or a combination of the two. A software module may reside in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. A method for self-checking a hash algorithm coprocessor, the method comprising:
the single chip microcomputer obtains small block verification data from a system area to generate first data, obtains small block data verification codes to generate first check codes, obtains large block verification data to generate second data, and obtains large block data verification codes to generate second check codes;
the single chip microcomputer carries out first self-checking parameter checking processing on the first data;
after the first self-checking parameter is checked successfully, the single chip microcomputer carries out second self-checking parameter checking processing on the first checking code;
when the second self-checking parameter is checked successfully, the single chip microcomputer carries out third self-checking parameter checking processing on the second data;
when the third self-checking parameter is checked successfully, the single chip microcomputer carries out fourth self-checking parameter checking processing on the second checking code;
after the fourth self-checking parameter is checked successfully, the singlechip uses the coprocessor to perform small block data hash calculation on the first data according to the first data and the second data to generate a first temporary check code, and uses the coprocessor to perform large block data hash calculation on the second data to generate a second temporary check code;
the single chip microcomputer carries out first function self-checking processing according to the first temporary checking code and the first checking code;
after the first function self-checking is successful, the single chip microcomputer carries out second function self-checking processing according to the second temporary check code and the second check code;
and after the second function self-checking is successful, the single chip microcomputer sets the value of a self-checking error counter of the coprocessor of the system area to be 0 and sends the information of successful self-checking to the upper computer.
2. The method of claim 1, wherein the single-chip microcomputer obtains the cell verification data from the system area to generate the first data, and before the step, the method further comprises:
and the single chip microcomputer sets the small block verification data, the small block data verification code, the large block verification data and the large block data verification code in a system area.
3. The method according to claim 1, wherein the single chip microcomputer performs first self-checking parameter verification processing on the first data, and specifically includes:
the single chip microcomputer carries out all-zero parameter verification processing on the value of the first data, and specifically: when the value of the first data is a full hexadecimal 0, the first self-checking parameter fails to check; when the value of the first data is not all hexadecimal 0, the first self-checking parameter is checked successfully.
4. The method according to claim 1, wherein the performing, by the single chip microcomputer, the second self-checking parameter checking process on the first check code specifically includes:
the single chip microcomputer carries out all-zero parameter verification processing on the value of the first verification code, and specifically comprises the following steps: when the value of the first check code is full hexadecimal 0, the second self-checking parameter fails to check; and when the value of the first check code is not 0 in the full hexadecimal system, the second self-checking parameter is checked successfully.
5. The method according to claim 1, wherein the third self-test parameter verification processing is performed on the second data by the single chip microcomputer, and specifically includes:
the single chip microcomputer carries out all-zero parameter verification processing on the value of the second data, and specifically comprises the following steps: when the value of the second data is a full hexadecimal 0, the third self-checking parameter fails to check; and when the value of the second data is not 0 in full hexadecimal, the third self-checking parameter is checked successfully.
6. The method according to claim 1, wherein the performing, by the single chip microcomputer, a fourth self-checking parameter checking process on the second check code specifically includes:
the single chip microcomputer carries out all-zero parameter check processing on the value of the second check code, and specifically: when the value of the second check code is full hexadecimal 0, the fourth self-checking parameter fails to check; and when the value of the second check code is not 0 in full hexadecimal, the fourth self-checking parameter is checked successfully.
7. The method according to claim 1, wherein the single chip microcomputer performs a first functional self-test check process according to the first temporary check code and the first check code, and specifically includes:
the single chip microcomputer judges whether the values of the first temporary check code and the first check code are equal, and if the values of the first temporary check code and the first check code are equal, the first function self-check is successful; and if the values of the first temporary check code and the first check code are not equal, the first functional self-checking fails.
8. The method according to claim 1, wherein the performing, by the single chip microcomputer, a second functional self-check processing according to the second temporary check code and the second check code specifically includes:
the single chip microcomputer judges whether the values of the second temporary check code and the second check code are equal, and if the values of the second temporary check code and the second check code are equal, the second function self-check is successful; and if the values of the second temporary check code and the second check code are not equal, the second functional self-check fails.
9. The method of claim 1, further comprising:
when the first self-checking parameter is failed to check, the single chip microcomputer sets the value of a self-checking error counter of the coprocessor in the system area to be added with 1, the single chip microcomputer exits the self-checking processing flow of the coprocessor and returns error information: verifying that the parameters are wrong;
when the second self-checking parameter is failed to check, the single chip microcomputer sets the value of a self-checking error counter of the coprocessor in the system area to be added by 1, the single chip microcomputer exits the self-checking processing flow of the coprocessor, and error information is returned: verifying that the parameter is wrong;
when the third self-checking parameter fails to check, the single chip microcomputer sets the value of a self-checking error counter of the coprocessor of the system area to be increased by 1, the single chip microcomputer exits the self-checking processing flow of the coprocessor and returns error information: verifying that the parameters are wrong;
when the first function self-checking check fails, the single chip microcomputer sets the value of a coprocessor self-checking error counter of the system area to be added by 1, the single chip microcomputer exits the coprocessor self-checking processing flow and returns error information: the small block data hash function of the coprocessor is wrong;
when the second function self-checking check fails, the single chip microcomputer sets the value of a coprocessor self-checking error counter of the system area to be added by 1, the single chip microcomputer exits the coprocessor self-checking processing flow and returns error information: the coprocessor has a big data hash function error.
10. The method of claim 1, further comprising:
and when the value of the self-checking error counter of the coprocessor exceeds a limit value, the single chip microcomputer stops the use function of the coprocessor.
CN201910761889.8A 2019-08-16 2019-08-16 Self-checking method of Hash algorithm coprocessor Active CN110502380B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910761889.8A CN110502380B (en) 2019-08-16 2019-08-16 Self-checking method of Hash algorithm coprocessor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910761889.8A CN110502380B (en) 2019-08-16 2019-08-16 Self-checking method of Hash algorithm coprocessor

Publications (2)

Publication Number Publication Date
CN110502380A CN110502380A (en) 2019-11-26
CN110502380B true CN110502380B (en) 2022-11-22

Family

ID=68588249

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910761889.8A Active CN110502380B (en) 2019-08-16 2019-08-16 Self-checking method of Hash algorithm coprocessor

Country Status (1)

Country Link
CN (1) CN110502380B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113821396A (en) * 2020-06-18 2021-12-21 中车株洲电力机车研究所有限公司 Processor running state monitoring and diagnosing method and device
CN114696963B (en) * 2022-03-16 2023-05-26 西安电子科技大学广州研究院 High-reliability communication system for network-on-chip of multi-core processor system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105280240A (en) * 2015-11-18 2016-01-27 致象尔微电子科技(上海)有限公司 Nand Flash parameter reading method
CN109981671A (en) * 2019-04-03 2019-07-05 北京深思数盾科技股份有限公司 Data processing method and encryption equipment based on encryption equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100618379B1 (en) * 2005-02-23 2006-08-31 삼성전자주식회사 Apparatus for verifying integrity of device memory remotely and system thereof and method for verifying integrity

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105280240A (en) * 2015-11-18 2016-01-27 致象尔微电子科技(上海)有限公司 Nand Flash parameter reading method
CN109981671A (en) * 2019-04-03 2019-07-05 北京深思数盾科技股份有限公司 Data processing method and encryption equipment based on encryption equipment

Also Published As

Publication number Publication date
CN110502380A (en) 2019-11-26

Similar Documents

Publication Publication Date Title
US7921286B2 (en) Computer initialization for secure kernel
US9720782B2 (en) Authenticating a backup image with bifurcated storage
RU2254608C2 (en) Method for protecting program execution process
CN110502380B (en) Self-checking method of Hash algorithm coprocessor
US10430593B2 (en) Boot images for units under test
US9262631B2 (en) Embedded device and control method thereof
US11755406B2 (en) Error identification in executed code
CN101650764A (en) Creditable calculation password platform and realization method thereof
CN108038021B (en) Code memory checking method for computer program operation stage
CN111095200A (en) Method, device and equipment for safely upgrading embedded program and storage medium
CN112016092A (en) TPM (trusted platform Module) -server-based asset information multilayer protection device and method
US11347858B2 (en) System and method to inhibit firmware downgrade
JPH08508352A (en) Safe critical processor and processing method for data processing system
CN117032908B (en) Integrated computing device deployment operation method and system based on redundancy architecture
US10289510B1 (en) Intelligent platform management interface functional fuzzer
CN110502379B (en) Self-checking method for coprocessor of elliptic encryption algorithm
CN112955889A (en) Safe starting device and method
CN112861137A (en) Secure firmware
CN110289960B (en) Method for preventing injection type attack of public key cryptographic algorithm coprocessor
CN110502360B (en) Self-checking method for advanced encryption standard coprocessor
US20200034540A1 (en) Executing processes in sequence
CN111107089B (en) Method and device for protecting data transmission safety of Android system
CN110502209B (en) Method for preventing random number generator from injection attack
US10242183B2 (en) Method of executing a program by a processor and electronic entity comprising such a processor
CN117494232B (en) Method, device, system, storage medium and electronic equipment for executing firmware

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100080, Beijing, Suzhou Street, Haidian District No. 20, building 2, on the north side of the four floor

Applicant after: Zhaoxun Hengda Technology Co.,Ltd.

Address before: 100080, Beijing, Suzhou Street, Haidian District No. 20, building 2, on the north side of the four floor

Applicant before: MEGAHUNT MICROELECTRONIC TECH. (BEIJING) Co.,Ltd.

GR01 Patent grant
GR01 Patent grant